How to 100% pass SY0-501 exam? Lead2pass provides the guaranteed SY0-501 exam preparation material to boost up your confidence in SY0-501 exam. Successful candidates have provided their reviews about our SY0-501 dumps. Now Lead2pass supplying the new version of SY0-501 VCE and PDF dumps. We ensure our SY0-501 exam questions are the most complete and authoritative compared with others', which will ensure your SY0-501 exam pass.

QUESTION 101A security guard has informed the Chief Information Security Officer that a person with a tablet has been walking around the building. The guard also noticed strange white markings in different areas of the parking lot. The person is attempting which of the following types of attacks?

A. JammingB. War chalkingC. Packet sniffingD. Near field communication

Answer: B

QUESTION 102A system administrator is configuring a site-to-site VPN tunnel. Which of the following should be configured on the VPN concentrator during the IKE phase?

A. RIPEMDB. ECDHEC. Diffie-HellmanD. HTTPS

Answer: C

QUESTION 103A network operations manager has added a second row of server racks in the datacenter.These racks face the opposite direction of the first row of racks.Which of the following is the reason the manager installed the racks this way?

A. To lower energy consumption by sharing power outletsB. To create environmental hot and cold islesC. To eliminate the potential for electromagnetic interferenceD. To maximize fire suppression capabilities

Answer: B

QUESTION 104Phishing emails frequently take advantage of high-profile catastrophes reported in the news. Which of the following principles BEST describes the weakness being exploited?

A. IntimidationB. ScarcityC. AuthorityD. Social proof

Answer: D

QUESTION 105Users report the following message appears when browsing to the company's secure site:This website cannot be trusted. Which of the following actions should a security analyst take to resolve these messages? (Select TWO).

A. Verify the certificate has not expired on the server.B. Ensure the certificate has a .pfx extension on the server.C. Update the root certificate into the client computer certificate store.D. Install the updated private key on the web server.E. Have users clear their browsing history and relaunch the session.

Answer: BD

QUESTION 106Drag and Drop QuestionDrag the items on the left to show the different types of security for the shown devices. Not all fields need to be filled. Not all items need to be used.

Answer:

Explanation:For mobile devices, at bare minimum you should have the following security measures in place:Screen lock, Strong password, Device encryption, Remote wipe/Sanitation, voice encryption, GPS tracking, Application control, Storage segmentation, Asset tracking as well as Device Access control.For servers in a data center your security should include: Fire extinguishers such as FM200 as part of fire suppression; Biometric, proximity badges, mantraps, HVAC, cable locks; these can all be physical security measures to control access to the server.

QUESTION 107A company hires a consulting firm to crawl its Active Directory network with a non-domain account looking for unpatched systems. Actively taking control of systems is out of scope, as is the creation of new administrator accounts. For which of the following is the company hiring the consulting firm?

QUESTION 108Two users need to send each other emails over unsecured channels.The system should support the principle of non-repudiation.Winch of the following should be used to sign the users' certificates?

A. CAB. CRLC. CSR

Answer: C

QUESTION 109Multiple employees receive an email with a malicious attachment that begins to encrypt their hard drives and mapped shares on their devices when it is opened.The network and security teams perform the following actions:

* Shut down all network shares.* Run an email search identifying all employees who received the malicious message.* Reimage all devices belonging to users who opened the attachment.

Next, the teams want to re-enable the network shares. Which of the following BEST describes this phase of the incident response process?

A. EradicationB. ContainmentC. RecoveryD. Lessons learned

Answer: A

QUESTION 110Which of the following specifically describes the exploitation of an interactive process to access otherwise restricted areas of the OS?

The CompTIA SY0-501 exam questions from Lead2pass are the most reliable guide for CompTIA exam. We offer the latest SY0-501 PDF and VCE dumps with new version VCE player for free download, and the newest SY0-501 dump ensures your exam 100% pass. A large number of successful candidates have shown a lot of faith in our SY0-501 exam dumps. If you want pass the CompTIA SY0-501 exam, please choose Lead2pass.